This document discusses using neuro-fuzzy networks to identify parameters for mathematical models of geofields. It proposes a new technique using fuzzy neural networks that can be applied even when data is limited and uncertain in the early stages of modeling. A numerical example is provided to demonstrate the identification of parameters for a regression equation model of a geofield using a fuzzy neural network structure. The network is trained on experimental fuzzy statistical data to determine values for the regression coefficients that satisfy the data. The technique is concluded to have advantages over traditional statistical methods as it can be applied regardless of the parameter distribution and is well-suited for cases with insufficient data in early modeling stages.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Regeneration of simple and complicated curves using Fourier seriesIJAEMSJORNAL
This paper intended to demonstrate how to regenerate the simple forms and the complicated patterns composed of sine curves using Fourier series. The result shows that the Fourier series is a preferred method over other methods described in this paper. The experimental result of the regenerated patterns proves the efficiency and the reliability of the proposed method.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Regeneration of simple and complicated curves using Fourier seriesIJAEMSJORNAL
This paper intended to demonstrate how to regenerate the simple forms and the complicated patterns composed of sine curves using Fourier series. The result shows that the Fourier series is a preferred method over other methods described in this paper. The experimental result of the regenerated patterns proves the efficiency and the reliability of the proposed method.
When Classifier Selection meets Information Theory: A Unifying ViewMohamed Farouk
Classifier selection aims to reduce the size of an
ensemble of classifiers in order to improve its efficiency and
classification accuracy. Recently an information-theoretic view
was presented for feature selection. It derives a space of possible
selection criteria and show that several feature selection criteria
in the literature are points within this continuous space. The
contribution of this paper is to export this information-theoretic
view to solve an open issue in ensemble learning which is
classifier selection. We investigated a couple of informationtheoretic
selection criteria that are used to rank classifiers.
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
Image Retrieval Using VLAD with Multiple Featurescsandit
The objective of this paper is to propose a combinatorial encoding method based on VLAD to
facilitate the promotion of accuracy for large scale image retrieval. Unlike using a single
feature in VLAD, the proposed method applies multiple heterogeneous types of features, such as
SIFT, SURF, DAISY, and HOG, to form an integrated encoding vector for an image
representation. The experimental results show that combining complementary types of features
and increasing codebook size yield high precision for retrieval.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
When Classifier Selection meets Information Theory: A Unifying ViewMohamed Farouk
Classifier selection aims to reduce the size of an
ensemble of classifiers in order to improve its efficiency and
classification accuracy. Recently an information-theoretic view
was presented for feature selection. It derives a space of possible
selection criteria and show that several feature selection criteria
in the literature are points within this continuous space. The
contribution of this paper is to export this information-theoretic
view to solve an open issue in ensemble learning which is
classifier selection. We investigated a couple of informationtheoretic
selection criteria that are used to rank classifiers.
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
Image Retrieval Using VLAD with Multiple Featurescsandit
The objective of this paper is to propose a combinatorial encoding method based on VLAD to
facilitate the promotion of accuracy for large scale image retrieval. Unlike using a single
feature in VLAD, the proposed method applies multiple heterogeneous types of features, such as
SIFT, SURF, DAISY, and HOG, to form an integrated encoding vector for an image
representation. The experimental results show that combining complementary types of features
and increasing codebook size yield high precision for retrieval.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Geoid height determination is one of the major problems of geodesy because usage of satellite
techniques in geodesy isgetting increasing. Geoid heights can be determined using different methods according
to the available data. Soft computing methods such as Fuzzy logic and neural networks became so popular that
they are used to solve many engineering problems. Fuzzy logic theory and later developments in uncertainty
assessment have enabled us to develop more precise models for our requirements. In this study, How to
construct the best fuzzy model is examined. For this purpose, three different data sets were taken and two
different kinds (two inpust one output and three inputs one output) fuzzy model were formed for the calculation
of geoid heights in Istanbul (Turkey). The Fuzzy models results of these were compared with geoid heights
obtained by GPS/levelling methods. The fuzzy approximation models were tested on the test points.
Computation of electromagnetic fields scattered from dielectric objects of un...Alexander Litvinenko
Computational tools for characterizing electromagnetic scattering from objects with uncertain shapes are needed in various applications ranging from remote sensing at microwave frequencies to Raman spectroscopy at optical frequencies. Often, such computational tools use the Monte Carlo (MC) method to sample a parametric space describing geometric uncertainties. For each sample, which corresponds to a realization of the geometry, a deterministic electromagnetic solver computes the scattered fields. However, for an accurate statistical characterization the number of MC samples has to be large. In this work, to address this challenge, the continuation multilevel Monte Carlo (\CMLMC) method is used together with a surface integral equation solver.
The \CMLMC method optimally balances statistical errors due to sampling of
the parametric space, and numerical errors due to the discretization of the geometry using a hierarchy of discretizations, from coarse to fine.
The number of realizations of finer discretizations can be kept low, with most samples
computed on coarser discretizations to minimize computational cost.
Consequently, the total execution time is significantly reduced, in comparison to the standard MC scheme.
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...IOSRJECE
In modern radar applications, it is frequently required to produce sum and difference patterns sequentially. The sum pattern amplitude coefficients are obtained by using Dolph-Chebyshev synthesis method where as the difference pattern excitation coefficients will be optimized in this present work. For this purpose optimal group weights will be introduced to the different array elements to obtain any type of beam depending on the application. Optimization of excitation to the array elements is the main objective so in this process a subarray configuration is adopted. However, Differential Evolution Algorithm is applied for optimization method. The proposed method is reliable and accurate. It is superior to other methods in terms of convergence speed and robustness. Numerical and simulation results are presented.
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...ijsc
Application of Artificial Neural Network Committee Machine (ANNCM) for the inversion of magnetic
anomalies caused by a long-2D horizontal circular cylinder is presented. Although, the subsurface targets
are of arbitrary shape, they are assumed to be regular geometrical shape for convenience of mathematical
analysis. ANNCM inversion extract the parameters of the causative subsurface targets include depth to the
centre of the cylinder (Z), the inclination of magnetic vector(Ɵ)and the constant term (A)comprising the
radius(R)and the intensity of the magnetic field(I). The method of inversion is demonstrated over a
theoretical model with and without random noise in order to study the effect of noise on the technique and
then extended to real field data. It is noted that the method under discussion ensures fairly accurate results
even in the presence of noise. ANNCM analysis of vertical magnetic anomaly near Karimnagar, Telangana,
India, has shown satisfactory results in comparison with other inversion techniques that are in vogue.The
statistics of the predicted parameters relative to the measured data, show lower sum error (<9.58%) and
higher correlation coefficient (R>91%) indicating that good matching and correlation is achieved between
the measured and predicted parameters.
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...ijsc
Application of Artificial Neural Network Committee Machine (ANNCM) for the inversion of magnetic
anomalies caused by a long-2D horizontal circular cylinder is presented. Although, the subsurface targets
are of arbitrary shape, they are assumed to be regular geometrical shape for convenience of mathematical
analysis. ANNCM inversion extract the parameters of the causative subsurface targets include depth to the
centre of the cylinder (Z), the inclination of magnetic vector(Ɵ)and the constant term (A)comprising the
radius(R)and the intensity of the magnetic field(I). The method of inversion is demonstrated over a
theoretical model with and without random noise in order to study the effect of noise on the technique and
then extended to real field data. It is noted that the method under discussion ensures fairly accurate results
even in the presence of noise. ANNCM analysis of vertical magnetic anomaly near Karimnagar, Telangana,
India, has shown satisfactory results in comparison with other inversion techniques that are in vogue.The
statistics of the predicted parameters relative to the measured data, show lower sum error (<9.58%) and
higher correlation coefficient (R>91%) indicating that good matching and correlation is achieved between
the measured and predicted parameters.
Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...ijsc
Application of Artificial Neural Network Committee Machine (ANNCM) for the inversion of magnetic anomalies caused by a long-2D horizontal circular cylinder is presented. Although, the subsurface targets are of arbitrary shape, they are assumed to be regular geometrical shape for convenience of mathematical analysis. ANNCM inversion extract the parameters of the causative subsurface targets include depth to the centre of the cylinder (Z), the inclination of magnetic vector(Ɵ)and the constant term (A)comprising the radius(R)and the intensity of the magnetic field(I). The method of inversion is demonstrated over a theoretical model with and without random noise in order to study the effect of noise on the technique and then extended to real field data. It is noted that the method under discussion ensures fairly accurate results even in the presence of noise. ANNCM analysis of vertical magnetic anomaly near Karimnagar, Telangana, India, has shown satisfactory results in comparison with other inversion techniques that are in vogue.The statistics of the predicted parameters relative to the measured data, show lower sum error (<9.58%) and higher correlation coefficient (R>91%) indicating that good matching and correlation is achieved between the measured and predicted parameters.
Sparse data formats and efficient numerical methods for uncertainties in nume...Alexander Litvinenko
Description of methodologies and overview of numerical methods, which we used for modeling and quantification of uncertainties in numerical aerodynamics
FITTED OPERATOR FINITE DIFFERENCE METHOD FOR SINGULARLY PERTURBED PARABOLIC C...ieijjournal
In this paper, we study the numerical solution of singularly perturbed parabolic convection-diffusion type
with boundary layers at the right side. To solve this problem, the backward-Euler with Richardson
extrapolation method is applied on the time direction and the fitted operator finite difference method on the
spatial direction is used, on the uniform grids. The stability and consistency of the method were established
very well to guarantee the convergence of the method. Numerical experimentation is carried out on model
examples, and the results are presented both in tables and graphs. Further, the present method gives a more
accurate solution than some existing methods reported in the literature.
FITTED OPERATOR FINITE DIFFERENCE METHOD FOR SINGULARLY PERTURBED PARABOLIC C...ieijjournal
In this paper, we study the numerical solution of singularly perturbed parabolic convection-diffusion type
with boundary layers at the right side. To solve this problem, the backward-Euler with Richardson
extrapolation method is applied on the time direction and the fitted operator finite difference method on the
spatial direction is used, on the uniform grids. The stability and consistency of the method were established
very well to guarantee the convergence of the method. Numerical experimentation is carried out on model
examples, and the results are presented both in tables and graphs. Further, the present method gives a more
accurate solution than some existing methods reported in the literature.
Computation of Electromagnetic Fields Scattered from Dielectric Objects of Un...Alexander Litvinenko
We research how input uncertainties in the geometry shape propagate through the electromagnetic model to electro-magnetic fields. We use multi-level Monte Carlo methods.
The Geometric Characteristics of the Linear Features in Close Range Photogram...IJERD Editor
The accuracy of photogrammetry can be increased with better instruments, careful geometric
characteristics of the system, more observations and rigorous adjustment. The main objective of this research is
to develop a new mathematical model of two types of linear features (straight line, spline curve) in addition to
relating linear features in object space to the image space using the Direct Linear Transformation (DLT). The
second main objective of the present paper is to study of some geometric characteristics of the system, when the
linear features are used in close range photogrammetric reduction processes. In this research, the accuracy
improvement has been evaluated by adopting certain assessment criteria, this will be performed by computing
the positional discrepancies between the photogrammetrically calculated object space coordinates of some check
object points, with the original check points of the test field, in terms of their respective RMS errors values. In
addition, the resulting least squares estimated covariance matrices of the check object point's space coordinates.
To perform the above purposes, some experiments are performed with synthetic images. The obtained results
showed significant improvements in the positional accuracy of close range photogrammetry, when starting node,
end nodes, and interior node on straight line and spline curve are increased with certain specifications regarding
the location and magnitude of each type of them.
International journal of engineering and mathematical modelling vol2 no1_2015_1IJEMM
Our efforts are mostly concentrated on improving the convergence rate of the numerical procedures both from the viewpoint of cost-efficiency and accuracy by handling the parametrization of the shape to be optimized. We employ nested parameterization supports of either shape, or shape deformation, and the classical process of degree elevation resulting in exact geometrical data transfer from coarse to fine representations. The algorithms mimick classical multigrid strategies and are found very effective in terms of convergence acceleration. In this paper, we analyse and demonstrate the efficiency of the two-level correction algorithm which is the basic block of a more general miltilevel strategy.
Improving Performance of Back propagation Learning Algorithmijsrd.com
The standard back-propagation algorithm is one of the most widely used algorithm for training feed-forward neural networks. One major drawback of this algorithm is it might fall into local minima and slow convergence rate. Natural gradient descent is principal method for solving nonlinear function is presented and is combined with the modified back-propagation algorithm yielding a new fast training multilayer algorithm. This paper describes new approach to natural gradient learning in which the number of parameters necessary is much smaller than the natural gradient algorithm. This new method exploits the algebraic structure of the parameter space to reduce the space and time complexity of algorithm and improve its performance.
Computer Science
Active and Programmable Networks
Active safety systems
Ad Hoc & Sensor Network
Ad hoc networks for pervasive communications
Adaptive, autonomic and context-aware computing
Advance Computing technology and their application
Advanced Computing Architectures and New Programming Models
Advanced control and measurement
Aeronautical Engineering,
Agent-based middleware
Alert applications
Automotive, marine and aero-space control and all other control applications
Autonomic and self-managing middleware
Autonomous vehicle
Biochemistry
Bioinformatics
BioTechnology(Chemistry, Mathematics, Statistics, Geology)
Broadband and intelligent networks
Broadband wireless technologies
CAD/CAM/CAT/CIM
Call admission and flow/congestion control
Capacity planning and dimensioning
Changing Access to Patient Information
Channel capacity modelling and analysis
Civil Engineering,
Cloud Computing and Applications
Collaborative applications
Communication application
Communication architectures for pervasive computing
Communication systems
Computational intelligence
Computer and microprocessor-based control
Computer Architecture and Embedded Systems
Computer Business
Computer Sciences and Applications
Computer Vision
Computer-based information systems in health care
Computing Ethics
Computing Practices & Applications
Congestion and/or Flow Control
Content Distribution
Context-awareness and middleware
Creativity in Internet management and retailing
Cross-layer design and Physical layer based issue
Cryptography
Data Base Management
Data fusion
Data Mining
Data retrieval
Data Storage Management
Decision analysis methods
Decision making
Digital Economy and Digital Divide
Digital signal processing theory
Distributed Sensor Networks
Drives automation
Drug Design,
Drug Development
DSP implementation
E-Business
E-Commerce
E-Government
Electronic transceiver device for Retail Marketing Industries
Electronics Engineering,
Embeded Computer System
Emerging advances in business and its applications
Emerging signal processing areas
Enabling technologies for pervasive systems
Energy-efficient and green pervasive computing
Environmental Engineering,
Estimation and identification techniques
Evaluation techniques for middleware solutions
Event-based, publish/subscribe, and message-oriented middleware
Evolutionary computing and intelligent systems
Expert approaches
Facilities planning and management
Flexible manufacturing systems
Formal methods and tools for designing
Fuzzy algorithms
Fuzzy logics
GPS and location-based app
Modelling Quantum Transport in Nanostructuresiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-geofield (20)
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
1. World Academy of Science, Engineering and Technology
International Journal of Mathematical, Computational Science and Engineering Vol:1 No:12, 2007
Neuro – Fuzzy Networks for Identification of
Mathematical Model Parameters of Geofield
A. Pashayev, R. Sadiqov, C. Ardil, F. Ildiz , and H. Karabork
m
identification of parameters for mathematical models of geofields is
proposed and checked. The effectiveness of that soft computing
technology is demonstrated, especially in the early stage of
modeling, when the information is uncertain and limited.
International Science Index 12, 2007 waset.org/publications/8427
Keywords—Identification, interpolation methods, neurofuzzy networks, geofield.
F
I. INTRODUCTION
many problems in sciences on Earth (geodesy,
geology, geophysics, cartography, photogrammetry, etc.)
the problem of modeling the geofields surface (height, depth,
pressure, temperature, pollution factor, etc.), wich is usually
displayed on maps by means of isolines, is urgent. If
representation of geofields surface is possible as function of
two variables h=f (x, y), which has hi values at (xi, yi), (i
OR
= 1, n ) peaks, the digital model of this function is required for
computer processing and storage.
We are going to consider the digital model of geofield
(DMG) as a set of digital values of continuous objects in
cartography (e.g. height of a relief) for which their spatial
coordinates and the mean of structural description are
specified. It will allow calculating the values of geofield in the
given area. The important part of any DMG is the method of
interpolating of its surface. For this, various ways of
interpolation yield various results which can be estimated only
from the point of view of practical applications [1- 6].
Nowadays, more than ten methods of surface interpolation
are known. They are as fellows algebraic and orthogonal
polynoms, rational fractions; in some eases they take functions
satisfying some apriori given conditions (e.g. positivity of f (x,
y)) values; multi squadric function, at which approximation is
reached bu means of square – law functions (squadric),
representing hyperboles; splines; geostatic methods (kriging).
However, none of them is completely universal. We shall
consider widely used procedure of interpolation by algebraic
polynoms
n
h ( x, y) = ∑∑ A ijxiyj
Abstract—The new technology of fuzzy neural networks for
i =0 j=0
where i = 0, m; j = 0, n - exponents; A - factors at
decomposition members received on a method of least squares
(LSM).
Realization of these methods is rather simple; therefore they
have received a wide circulation [1-5]. This is the linear
interpolation modeling of a surface as set of triangles. Thus
the normal to a surface is constant along all surface of a
triangle and sharply varies at transition through the sides
separating triangles. Therefore, LSM constructed with use of
linear interpolation, frequently insufficiently adequately
represent the investigated phenomenon [2].
The much better result (absence of sharp differences of
values of researched parameter, smoothness of isolines), is
given by modeling with the use of polynomial to interpolation
of higher degree. The general (common) expression for
calculation of value, for example, heights h in a point of a
surface with coordinates (x, y) looks like:
m
h(x,y)= ∑
m− j
∑
Cjkxj yk
(1)
j= 0 k =0
We shall consider a special case (1) at m=2, that is the
equation of regress of the second order
H(x,y)=C00+C10x+C01y+C20x2+C11xy+C02y2
(2)
The equation of measurements of target coordinate h for
this case will be written down as:
Zh=C00+C10x+C01y+C20x2+C11xy+C02y2+δh
Then the model of an experimental material can be
presented in the following matrix kind:
Zh=Xθ+δh,
where Zh = || z1h, z2h,…, znh || - a vector of measurements of
target coordinate h; θ= ||C00, C10, C01, C20, C11, C02||T - a vector
of required factors;
Manuscript received June 30, 2005. This work (R. Sadiqov) was supported
by TUBITAK NATO-PC B program.
Authors are with the National Academy of Aviation, AZ1045, Bina, 25th
km, Baku, Azerbaijan (corresponding author to provide phone: 99412- 49728-29, fax: 99412-497-28-29, e-mail : sadixov@mail.ru).
312
2. World Academy of Science, Engineering and Technology
International Journal of Mathematical, Computational Science and Engineering Vol:1 No:12, 2007
1 x1
1 x2
X=
− −
y1
y2
1 xn
yn
2
x1 x1 y1
x 2 x 2 y2
2
− − −
x2
n
x n yn
neurons. When an neural network is used to solve equation
(3), the input signals of the network are the fuzzy values of the
~
~
variable B = (~ , ~ ), and the output is H . The fuzzy values of
x y
the parameters ~
are the network parameters. We present
c
2
y1
y2
2
−
y2
n
jk
A structural matrix; n - quantity(amount) of points of
supervision (measurements).
Usually for identification (estimation) of factors of a
polynom (2) are used LSM of the following kind
θ=(ХТХ)-1(ХТZh),
Dθ=(ХТХ)-1σ2,
International Science Index 12, 2007 waset.org/publications/8427
where D θ - dispersive matrix of mistakes of estimations.
The use of statistical probability methods, such as the leastsquares method, requires preliminary analysis of the data for
normality of the sample distribution. A normality check
assumes that the following four conditions are satisfied.
1. The intervals x ± σ, x ± 2σ x and x ± 3σ must contain 68,
95, and 100%, respectively, of the sample values x is the
mean and о is the standard deviation).
2. The coefficient of variation V must not exceed 33%.
3. The kurtosis E x and the asymmetry coefficient S k must
be close to zero.
4. x ≈ M . where M is the sample median.
The analysis [6] was used for modeling (2) showed that
distribution contradicted the normality assumption (Table 1).
It must be noted that in the early stage modeling of
geofield, the data are not only limited and uncertain but also
fuzzy (the output and input coordinates of the system are
measured in definite intervals and their values are measured
with errors).
It is therefore necessary to identify the parameters of a
mathematical model of a multivariate fuzzy object described
by the regression equation
m m− j
(3)
j= 0 k = 0
( j = 0, m; k = 0, m, j + k ≤ m)
where ~ jk
c
⎧
⎪1 − ( x − x ) / α, if
x − α < x < x;
⎪
µ( x ) = ⎨
x < x < x + β;
⎪1 − ( x − x ) / β, if
⎪
0,
otherwise
⎩
Neural-network training is the principal task in solving the
c
problem of identification of the parameters ~ jk of equation
(3). An α -section is used to train the parameter values [7].
We assume the presence of experimentally obtained fuzzy
statistical data. From the input and output data we compose
~~
training pairs for the network (B, T) . To construct a model of a
~
process, the input signals B are fed to the neural network
input (Fig.1); the output signals are compared with standard
~
output signals T .
After comparison, the deviation is calculated:
~ 1 l ~ ~
E = ∑ (H i − Ti ) 2
2 i =1
When an α -section is used. the deviations for the left and
right parts are calculated by the formulas
l
E1 =
1
2
∑ [h i1 ( α ) − t i1 ( α ) ]2 ,
E2 =
1
2
∑ [h i 2 ( α ) − t i 2 ( α ) ]2 ,
i =1
l
i =1
E = E1 + E 2 ,
II. PROBLEM FORMULATION AND SOLUTION
~
H m = ∑ ∑ ~ jk ⊗ ~ j ⊗ ~ k
c
x
y
the fuzzy variables in triangular form, the membership
functions of which are calculated by the formula
where
~
H i (α) = [h i1 (α), h i 2 (α)] ;
Training (correction) of the network parameters is
concluded when the deviations E for all training pairs are less
than the specified value (Fig. 2). Otherwise, it is continued
until E is minimized.
The network parameters for the left and right parts are
corrected a-s follows:
are the desired fuzzy parameters.
We shall determine the fuzzy values of the parameters ~ jk
c
cn 1 = co 1 + γ
jk
jk
of equation (3) using. experimental fuzzy statistical data of the
~
process, i.e., the input ~ , ~ and output H coordinates of the
x y
model. Let us consider a solution of this problem using fuzzy
logic and neural networks [7,8].
A neural network consists of interconnected sets of fuzzy
~
Ti (α) = [t i1 (α), t i 2 (α)]
∂E
,
∂c jk
Here co 1 , c n 1 , co 2 and
jk
jk
jk
cn 2 = co 2 + γ
jk
jk
cn 2
jk
∂E
,
∂c jk
(4)
are the old and new values
of the left and right pans of the neural network parameters
~ = [ c , c ] , and γ is the training rate.
cjk
jk1 jk2
313
3. World Academy of Science, Engineering and Technology
International Journal of Mathematical, Computational Science and Engineering Vol:1 No:12, 2007
h 51 = c111x 2 y2 ; h52 = c112x1y1 , and the correction formulas was
III. NUMERICAL EXAMPLE
Large Let us consider the mathematical model is described
the equation of fuzzy a regression (consider a special case (3)
at m=2):
~
H = ~00 + ~10~ + ~01~ + ~20~2 + ~11~ ~ + ~02~2.
c
c x c y c x c xy c y
(5)
We shall construct a neural structure for solution of (5) in
which the network parameters are the coefficients
~ , ~ , ~ , ~ , ~ , ~ . The structure has four inputs and one
c00 c10 c01 c20 c11 c02
output (Fig. 3).
Using a neuro-network structure, we employ (4) to train the
network parameters. For a = 0 , we obtain the following
expressions:
performed.
The network parameters were thus trained using the
described fuzzy-neural network structure and experimental
data. As a result, network-parameter values that satisfied the
experimental statistical data were found (see Table 2):
~ = (1.4124 1.4223 1.4275
c00
;
;
);
~ = (1.98842.11312.2339
c
;
;
);
10
~ = (−2.5353− 2.5349− 2.5326
c01
;
;
);
~ = (−1.1043−1.1042−1.1036
c
;
;
)
20
~ −(−0.8845−0.8741−0.8639
c11
;
;
);
~ = (1.31581.31621.3166
c
;
;
).
02
l
∂E 2
= ∑(h i2 − t i2 );
∂c002 i=1
l
∂E1
= ∑(h i1 − t i1 )x1;
∂c101 i=1
International Science Index 12, 2007 waset.org/publications/8427
l
∂E1
= ∑(h i1 − t i1 );
∂c001 i=1
l
∂E 2
= ∑(h i2 − t i2 )x 2 ;
∂c102 i=1
l
∂E1
= ∑(h i1 − t i1 )y1;
∂c011 i=1
l
∂E 2
= ∑(h i2 − t i2 )y 2 ;
∂c102 i=1
l
∂E1
2
= ∑(h i1 − t i1 )x1 ;
∂c111 i=1
l
∂E2
= ∑(h i2 − t i2 )x 2 ;
2
∂c112 i=1
l
∂E1
= ∑(h i1 − t i1 )x1y1;
∂c201 i=1
l
∂E2
= ∑(h i2 − t i2 )x 2 y2
∂c202 i=1
These data were obtained as a result of 20-minute training
of the neural network.The coefficients ~00 , ~10 , ~01, ~20 , ~11, ~02
c c c c c c
regression equation (5) were evaluated by a program written
in Turbo Pascal on an IBM PC.
l
∂E1
2
= ∑(h i1 − t i1 )y1 ;
∂c021 i=1
l
∂E1
= ∑(h i1 − t i1 )x 2 y2 ;
∂c111 i=1
For a = 1, we obtain
l
∂E3
= ∑(h i3 − t i3 );
∂c003 i=1
l
∂E3
= ∑(h i3 − t i3 )x 3 ;
∂c103 i=1
∂E3 l
=∑hi3 −ti3)y3;
(
∂c013 i=1
IV.
(6)
l
∂E2
= ∑(h i2 − t i2 )y2
2
∂c202 i=1
The use of fuzzy neural networks (Soft Computing) to solve
problems that involve evaluation parameters of mathematical
models of geofields advantages over traditional statisticalprobability approaches. Primary is the fact that the proposed
procedure can be used regardless of the type of distribution of
the parameters geofield. The more so because, in the early
stage of modeling, it is difficult to establish the type of
parameter distribution, due to insufficient data.
REFERENCES
l
∂E2
= ∑(h i2 − t i2 )x1y1;
∂c112 i=1
[1]
[2]
l
∂E3
= ∑(h i3 − t i3 )x 3 y3 ;
∂c113 i=1
[3]
[4]
l
∂E3
2
= ∑(h i3 − t i3 )x 3
∂c 203 i=1
∂E3 l
2
=∑hi3 −ti3)y3
(
∂c023 i=1
CONCLUSIONS
[5]
(7)
As a result of training (6) and (7), we find network
parameters that satisfy the knowledge base with the required
training quality.
Fuzzy statistical data (see Table 2) were collected from
experiments before the computer simulation It should be noted
that for negative values of the parameter ~jk (~jk < 0) , the
c c
[6]
[7]
[8]
formulas that include the parameter ~jk in (5) and the
c
correction of that parameter in (6) will have changed forms.
For example, if ~jk < 0 , the formula for the fifth expression,
c
which includes ~jk in (5) will have the following form:
c
314
M. Yanalak, Height interpolation in digital terran models. Ankara, Harita
dergisi, Temmuz 2002. Sayi: 128. p. 44 – 58.
A.Berlyant, L. Ushakova, Cartographic animations. Moscow: Scientific
World, 2000.
M. Jukov, S. Serbenyuk and V. Tikunov, Mathematical – cartographig
modeling in geography. Moscow: misl, 1980.
O. Akima, P. Hiroshi, Bivariate interpolation and smooth surface fitting
for irregulary distributed date points. ACM Transactions for
Mathematical Software. June 1978. p. 148 – 159.
J. Delhhome, Kriging in the hudro sciences // Adv. Water Res. 1978.
Vol. 1.№5.
L.Buryakovskii, I. Dzhafarov and Dzhefanshir, Modeling systems.
Moscow: Nedra, 1990.
R. Yager, L. Zadeh. (Eds.) Fuzzy sets, Neural Networks and Soft
Computing. Van Nostrand Reinhold – New York, 1994.
H. Mohamad. Fundamentals of Artificial Neural Networks, MIT Press,
Cambridge, Mass., London, 1995
4. World Academy of Science, Engineering and Technology
International Journal of Mathematical, Computational Science and Engineering Vol:1 No:12, 2007
APPENDIX
TABLE I
NORMALITY ASSUMPTION
68%
0.71≠0.59
non – exe –
cution
95%
100%
V<33%
Ex→0
Sk→0
77.7%
execu tion
x≈M
91.6 %
non – exe –
cution
100%
execu tion
47 %
non – exe –
cution
0.45
non – exe –
cution
1.14
non – exe cution
~
B
~
T
Input-output
relation
(knowledge base)
International Science Index 12, 2007 waset.org/publications/8427
Scaler
~
H
Нечеткая
Fuzzy
neuralНС
etwork
?+
~
Ε
Scaler
-
Fig. 1 Neural identification system
Correction algorithm
~
B
Input
signals
Neural
network
Parameters
Random-number
generator
Deviations
Training
quality
Fig. 2 System for network-parameter training (with backpropagation)
315
Target
signals
~
H
5. World Academy of Science, Engineering and Technology
International Journal of Mathematical, Computational Science and Engineering Vol:1 No:12, 2007
~ x
~ y ~ x
~ y
c10 ~ + c 01 ~ + c 20 ~ 2 + c 02 ~ 2
~
x
~
c00
~
x
~
x
~
H
~2
x
~
y
~
y
~
y
~ x y
c11~ ~
~2
y
Fig. 3 Structure of neural network for second-order regression equation
International Science Index 12, 2007 waset.org/publications/8427
TABLE II
THE EXPERIMENTAL STATISTICAL DATA
~
y
3,7,11
17,21,25
31,35,39
45,49,53
59,63,67
73,77,81
0.77,0.81,0.85
0.48,0.52,0.56
0.37,0.41,0.45
0.30,0.34,0.38
0.27,0.31,0.35
0.23,0.27,0.31
1.08,1.13,1.17
0.68,0.72,0.76
0.53,0.57,0.61
0.43,0.47,0.51
0.39,0.43,0.47
0.34,0.38,0.42
1.28,1.33,1.44
0.81,0.85,0.89
0.63,0.67,0.71
0.52,0.58,0.60
0.46,0.50,0.54
0.41,0.45,0.49
1.43,1.47,1.51
0.89,0.93,0.97
0.69,0.73,0.77
0.57,0.61,0.65
0.51,0.55,0.59
0.46,0.50,0.54
1.49,1.53,1.57
0.93,0.97,1.01
0.72,0.76,0.60
0.60,0.64,0.68
0.54,0.58,0.62
0.47,0.51,0.55
1.48,1.50,1.54
0.91,0.95,0.99
0.71,0.75,0.79
0.59,0.63,0.67
0.53,0.57,0.61
0.47,0.51,0.55
~
x
28,31,35
50,54,58
68,72,76
82,86,90
92,96,100
96,100,104
316